|
Introduction to WarDriving and Penetration Testing |
|
|
1 | (30) |
|
|
2 | (1) |
|
|
2 | (1) |
|
The Origins of WarDriving |
|
|
3 | (2) |
|
|
3 | (1) |
|
The Terminology History of WarDriving |
|
|
3 | (1) |
|
WarDriving Misconceptions |
|
|
4 | (1) |
|
The Truth about WarDriving |
|
|
4 | (1) |
|
The Legality of WarDriving |
|
|
5 | (1) |
|
Tools of the Trade or ``What Do I Need?'' |
|
|
5 | (9) |
|
|
6 | (1) |
|
|
6 | (1) |
|
The PDA or Handheld Setup |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Connecting Your Antenna to Your Wireless NIC |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (6) |
|
Disabling the Transmission Control Protocol/Internet Protocol Stack in Windows |
|
|
15 | (2) |
|
Disabling the TCP/IP Stack on an iPAQ |
|
|
17 | (2) |
|
A Brief History of Wireless Security |
|
|
19 | (1) |
|
|
20 | (5) |
|
Understanding WLAN Vulnerabilities |
|
|
21 | (1) |
|
Penetration Testing Wireless Networks |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
Tools for Penetration Testing |
|
|
25 | (1) |
|
Conclusion and What to Expect From this Book |
|
|
26 | (1) |
|
|
27 | (2) |
|
Frequently Asked Questions |
|
|
29 | (2) |
|
Understanding Antennas and Antenna Theory |
|
|
31 | (32) |
|
|
32 | (3) |
|
|
32 | (3) |
|
|
35 | (8) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
Differences Between Antenna Types |
|
|
43 | (10) |
|
|
44 | (1) |
|
Omnidirectional Signal Patterns |
|
|
44 | (2) |
|
|
46 | (1) |
|
Directional Antenna Types |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (3) |
|
Directional Signal Patterns |
|
|
53 | (1) |
|
|
53 | (6) |
|
|
53 | (1) |
|
|
54 | (1) |
|
How to Choose an Antenna for WarDriving or Penetration Testing |
|
|
55 | (1) |
|
|
56 | (1) |
|
Security Audit/Rogue Hunt and Open Penetration Testing |
|
|
57 | (1) |
|
``Red Team'' Penetration Test |
|
|
57 | (1) |
|
Where to Purchase WiFi Antennas |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
Frequently Asked Questions |
|
|
60 | (3) |
|
WarDriving With Handheld Devices and Direction Finding |
|
|
63 | (30) |
|
|
64 | (1) |
|
WarDriving with a Sharp Zaurus |
|
|
64 | (15) |
|
Installing and Configuring Kismet |
|
|
65 | (4) |
|
Configuring the Wireless Card to Work with Kismet |
|
|
69 | (3) |
|
Starting Kismet on the Zaurus |
|
|
72 | (1) |
|
Using a GPS with the Zaurus |
|
|
73 | (2) |
|
|
75 | (1) |
|
Using a Graphical Front End with Kismet |
|
|
76 | (2) |
|
Using an External WiFi Card with a Zaurus |
|
|
78 | (1) |
|
WarDriving with MiniStumbler |
|
|
79 | (8) |
|
Wireless Ethernet Cards that Work with MiniStumbler |
|
|
80 | (1) |
|
MiniStumbler Installation |
|
|
81 | (1) |
|
|
82 | (3) |
|
MiniStumbler Menus and Tool Icons |
|
|
85 | (1) |
|
Using a GPS with MiniStumbler |
|
|
86 | (1) |
|
Direction Finding with a Handheld Device |
|
|
87 | (3) |
|
|
90 | (1) |
|
|
91 | (1) |
|
Frequently Asked Questions |
|
|
92 | (1) |
|
WarDriving and Penetration Testing with Windows |
|
|
93 | (26) |
|
|
94 | (1) |
|
WarDriving with NetStumbler |
|
|
94 | (5) |
|
|
94 | (2) |
|
|
96 | (3) |
|
|
99 | (9) |
|
NetStumbler Menus and Tool Icons |
|
|
105 | (2) |
|
|
107 | (1) |
|
Wireless Penetration Testing with Windows |
|
|
108 | (9) |
|
|
109 | (3) |
|
Determining Network Topology |
|
|
112 | (1) |
|
|
112 | (5) |
|
|
117 | (1) |
|
|
117 | (1) |
|
Frequently Asked Questions |
|
|
118 | (1) |
|
WarDriving and Penetration Testing with Linux |
|
|
119 | (34) |
|
|
120 | (1) |
|
Preparing Your System to WarDrive |
|
|
120 | (11) |
|
|
120 | (1) |
|
Preparing the Kernel for Monitor Mode |
|
|
120 | (3) |
|
Preparing the Kernel for a Global Positioning System |
|
|
123 | (1) |
|
Installing the Proper Tools |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
Configuring Your System to WarDrive |
|
|
127 | (4) |
|
WarDriving with Linux and Kismet |
|
|
131 | (7) |
|
|
131 | (2) |
|
Using the Kismet Interface |
|
|
133 | (1) |
|
Understanding the Kismet Options |
|
|
133 | (4) |
|
Using a Graphical Front End |
|
|
137 | (1) |
|
Wireless Penetration Testing Using Linux |
|
|
138 | (12) |
|
|
140 | (1) |
|
WLAN Discovery Using Public Source Information |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
Deauthentication with Void11 |
|
|
145 | (1) |
|
Cracking WEP with the Aircrack Suite |
|
|
146 | (2) |
|
Cracking WPA with the CoWPAtty |
|
|
148 | (1) |
|
Association with the Target Network |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Frequently Asked Questions |
|
|
152 | (1) |
|
WarDriving and Wireless Penetration Testing with OS X |
|
|
153 | (30) |
|
|
154 | (1) |
|
|
154 | (16) |
|
Starting KisMAC and Initial Configuration |
|
|
154 | (1) |
|
Configuring the KisMAC Preferences |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (3) |
|
|
160 | (1) |
|
|
160 | (2) |
|
Mapping WarDrives with KisMAC |
|
|
162 | (1) |
|
|
162 | (4) |
|
|
166 | (1) |
|
Using the KisMAC Interface |
|
|
167 | (3) |
|
Penetration Testing with OS X |
|
|
170 | (6) |
|
Attacking WLAN Encryption with KisMAC |
|
|
171 | (1) |
|
Attacking WEP with KisMAC |
|
|
171 | (2) |
|
|
173 | (1) |
|
Attacking WPA with KisMAC |
|
|
174 | (1) |
|
|
175 | (1) |
|
Bruteforce Attacks Against 40-bit WEP |
|
|
175 | (1) |
|
|
175 | (1) |
|
Other OS X Tools for WarDriving and WLAN Testing |
|
|
176 | (2) |
|
|
178 | (1) |
|
|
178 | (2) |
|
Frequently Asked Questions |
|
|
180 | (3) |
|
Wireless Penetration Testing Using a Bootable Linux Distribution |
|
|
183 | (36) |
|
|
184 | (1) |
|
|
185 | (8) |
|
|
185 | (1) |
|
Choosing the Right Antenna |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (15) |
|
|
193 | (1) |
|
Intelligence Gathering Tools |
|
|
194 | (1) |
|
User's Network Newsgroups |
|
|
194 | (1) |
|
Google (Internet Search Engines) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (3) |
|
|
198 | (2) |
|
|
200 | (1) |
|
Vulnerability Assessment Tools |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
203 | (1) |
|
Deauthentication with Void11 |
|
|
203 | (2) |
|
Cracking WEP with the Aircrack Suite |
|
|
205 | (3) |
|
Cracking WPA with CoWPAtty |
|
|
208 | (1) |
|
|
208 | (6) |
|
|
209 | (3) |
|
Case Study: Cracking WPA-PSK |
|
|
212 | (2) |
|
|
214 | (1) |
|
Additional GPSMap Map Servers |
|
|
215 | (1) |
|
|
215 | (2) |
|
Frequently Asked Questions |
|
|
217 | (2) |
|
|
219 | (28) |
|
|
220 | (1) |
|
Using the Global Positioning System Daemon with Kismet |
|
|
220 | (6) |
|
|
220 | (3) |
|
|
223 | (1) |
|
Starting GPSD with Serial Data Cable |
|
|
223 | (2) |
|
Starting GPSD with USB Data Cable |
|
|
225 | (1) |
|
Configuring Kismet for Mapping |
|
|
226 | (1) |
|
|
226 | (1) |
|
Mapping WarDrives with GPSMAP |
|
|
227 | (4) |
|
Creating Maps with GPSMAP |
|
|
227 | (4) |
|
Mapping WarDrives with StumbVerter |
|
|
231 | (13) |
|
|
231 | (4) |
|
Generating a Map With StumbVerter |
|
|
235 | (1) |
|
Exporting NetStumbler Files for Use with StumbVerter |
|
|
235 | (2) |
|
Importing Summary Files to MapPoint with StumbVerter |
|
|
237 | (5) |
|
Saving Maps with StumbVerter |
|
|
242 | (2) |
|
|
244 | (1) |
|
|
245 | (1) |
|
Frequently Asked Questions |
|
|
246 | (1) |
|
Using Man-in-the-Middle Attacks to Your Advantage |
|
|
247 | (36) |
|
|
248 | (2) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
The Victim---Wireless Client(s) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
Hardware for the Attack---Antennas, Amps, WiFi Cards |
|
|
250 | (5) |
|
|
251 | (1) |
|
|
251 | (1) |
|
Choosing the Right Antenna |
|
|
252 | (1) |
|
Amplifying the Wireless Signal |
|
|
253 | (1) |
|
|
254 | (1) |
|
Identify and Compromise the Target Access Point |
|
|
255 | (2) |
|
|
255 | (1) |
|
|
255 | (2) |
|
The MITM Attack Laptop Configuration |
|
|
257 | (12) |
|
|
258 | (1) |
|
Obtaining the Kernel Source |
|
|
258 | (1) |
|
Configure and Build the Kernel |
|
|
258 | (3) |
|
Setting Up the Wireless Interfaces |
|
|
261 | (1) |
|
wlan0 - Connecting to the Target Network |
|
|
261 | (1) |
|
wlan1 - Setting up the AP |
|
|
261 | (1) |
|
IP Forwarding and NAT Using Iptables |
|
|
262 | (1) |
|
Installing Iptables and IP Forwarding |
|
|
263 | (1) |
|
Establishing the NAT Rules |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (2) |
|
Apache Hypertext Preprocessor and Virtual Web Servers |
|
|
267 | (2) |
|
Clone the Target Access Point and Begin the Attack |
|
|
269 | (9) |
|
Establish Wireless Connectivity and Verify Services are Started |
|
|
269 | (1) |
|
Start the Wireless Interface |
|
|
269 | (1) |
|
Verify Connectivity to the Target Access Point |
|
|
270 | (1) |
|
Verify Dnsmasq is Running |
|
|
270 | (1) |
|
Verify Iptables is Started and View the Running Rule Sets |
|
|
271 | (1) |
|
Deauthenticate Clients Connected to the Target Access Point |
|
|
272 | (1) |
|
Wait for the Client to Associate to Your Access Point |
|
|
272 | (1) |
|
Identify Target Web Applications |
|
|
273 | (1) |
|
|
274 | (1) |
|
Using wget to Download the Target Web Page |
|
|
274 | (1) |
|
|
274 | (2) |
|
Redirect Web Traffic Using Dnsmasq |
|
|
276 | (2) |
|
|
278 | (1) |
|
|
278 | (3) |
|
Frequently Asked Questions |
|
|
281 | (2) |
|
Using Custom Firmware for Wireless Penetration Testing |
|
|
283 | (36) |
|
Choices for Modifying the Firmware on a Wireless Access Point |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Installing OpenWRT on a Linksys WRT54G |
|
|
285 | (11) |
|
|
286 | (1) |
|
Installation and How Not to Create a Brick |
|
|
287 | (1) |
|
Installation via the Linksys Web Interface |
|
|
288 | (2) |
|
Installation via the TFTP Server |
|
|
290 | (3) |
|
|
293 | (3) |
|
Configuring and Understanding the OpenWRT Network Interfaces |
|
|
296 | (2) |
|
Installing and Managing Software Packages for OpenWRT |
|
|
298 | (4) |
|
Finding and Installing Packages |
|
|
299 | (3) |
|
|
302 | (1) |
|
Enumeration and Scanning from the WRT54G |
|
|
302 | (4) |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (2) |
|
Installation and Configuration of a Kismet Drone |
|
|
306 | (4) |
|
|
306 | (1) |
|
Configuring the Kismet Drone |
|
|
307 | (1) |
|
Making the Connection and Scanning |
|
|
307 | (3) |
|
Installing Aircrack to Crack a WEP Key |
|
|
310 | (4) |
|
Mounting a Remote File System |
|
|
310 | (1) |
|
Installing the Aircrack Tools |
|
|
311 | (3) |
|
|
314 | (1) |
|
|
315 | (3) |
|
Frequently Asked Questions |
|
|
318 | (1) |
|
|
319 | (24) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
Wireless Video Technologies |
|
|
321 | (6) |
|
|
322 | (2) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
327 | (12) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (5) |
|
|
334 | (2) |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
339 | (2) |
|
Frequently Asked Questions |
|
|
341 | (2) |
|
Appendix A Solutions Fast Track |
|
|
343 | (18) |
|
Appendix B Device Driver Auditing |
|
|
361 | (24) |
|
|
362 | (1) |
|
|
363 | (3) |
|
|
366 | (17) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
Setting Up a Test Environment |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (6) |
|
|
378 | (2) |
|
|
380 | (3) |
|
|
383 | (2) |
Index |
|
385 | |